Forms of Cyber Bullying & How to protect yourself from Cyber Bullying

The cyber bullying

It is the intentionally aggressive behavior using electronic media for the purpose of harassment , annoyance , embarrassment , intimidation and threat , The electronic attackers use the electronic media in bulling such as Electronic-mail , Electronic forums , Instant message , Blogging , and social media sites such as Facebook .

Ethics related to the Internet and all means of the information and the communication become one of the topical issues of interest that concerns the individuals , the communities and the countries , Through the Internet you can learn , entertain , communicate and talk through chats but you can also acquire the wrong information and know the bad people .

Forms of Cyber Bullying

The anonymity is the use of the pseudonyms to hide the attacker personality using the electronic media for doing the impunity actions , Harassment is the aggressive messages directed against one or more persons using the electronic media .

Cyber stalking is a type of annoyance using the electronic media to stalk or harass an individual or a group of individuals frequently , Flaming is the post of aggressive and insulting words using the electronic media .

Cyber bullying

Outing is posing information about a specific person or more improperly , Exclusion is disregarding one or more person through the electronic media , Cyber threats is sending e-mails that carry threat or menace to one or more persons .

How to protect yourself from cyber bullying

Do not share a password with anyone , Do not post any private data , Do not delete hostile or aggressive messages , Do not interview anyone you met through the internet, And set a password that can not be deduced .

Do not send messages when you are angry , You should inform your parents with what annoy you when you use the Internet , The download of software from the Internet have to be done under your parents supervision or your teachers supervision .

When someone want to send a message to a friend , He has no email account , And he wants to have your user name and password to send the message , So , do not share your password .

When you created your own e-mail , someone tried finding your password by writing your name , age and birth-date then the account was opened , So , you should set a password that can not be deduced .

Someone contributed in Facebook service and published information about his family , And also posted his family’s pictures and daily activities , A thief studied the information of the house and knew when there was no person at home , So , He should not post the private data .

When you complain to your teacher that your friend insulted you in an email message , You said that you have deleted it , The teacher said that you lost your evidence , So , You should not delete the cyber bullying messages .

You said to your father that you knew someone in a chat room and he asked you for a meeting , So , you should not interview anyone that you met through the Internet .

A dispute happened between two students , and then one of them was angry and he sent the intimidated and threatening letter to the other , So , he should be more patient .

A student uses the Internet for doing the school activities , He works in groups with his colleagues whenever he uses the Internet , he receives abusive chat or instant messages , He reduces the use of the Internet to avoid such abuse , And to protect himself from such attack , So , he should ask his parents for helping him to overcome that problem .

You have downloaded one of the free programs on your computer , as a result , dangerous computer virus infections appeared to the data stored and belong to your father , So , you have to consult your father first , before installing any program .